SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
CYBER
Shreyash patel
Presented by,
CRIME
1
o INTRODUCTION.
o DEFINITION.
o HISTORY.
o CYBER THREAT EVOLUTION.
o CATEGORIES OF CYBER CRIME.
o TYPES OF CYBER CRIME.
o PREVENTION.
o SECURITY.
o CONCLUSION.
CONTENTS
2
INTRODUCTION
The internet in India is growing rapidly. It has given rise to
new opportunities in every field we can think of be it
entertainment, business, sports or education and
technology.
There’re two sides to a coin. Internet also has it’s own
disadvantages is Cyber crime- illegal activity committed
on the internet.
3
DEFINING CYBERCRIME
There’re two sides to a coin. Internet also
has it’s own disadvantages is Cyber crime-
illegal activity committed on the internet.
Crime committed using a computer and the
internet to steal data or information.
4
DEFINING CYBERCRIME
 Cybercrime is nothing but where the computer
used as an object or subject of crime…
Whatever it is Online or Offline
 Crime on the web such as distribution of
pornography, including theft, and online
gambling, Hacking and such as
commandeering one computer to launch
attacks on other computers, are new.
5
HISTORY
 The first recorded cyber crime took place
in the year 1820 That is not surprising
considering the fact that the ABACUS,
which is thought to be the earliest form of
a computer, has been around many years
ago In India, Japan and China…but not
officially declare…
6
CYBER THREAT EVOLUTION
7
CATEGORIZE OF CYBERCRIME
The Computer as a Target : using a computer to
attack other computers.
The computer as a
weapon : using a
computer to commit real
world crimes.
8
TYPES OF CYBER CRIME
Hacking
Denial of service attack
Virus Dissemination
Computer Vandalism
Cyber Terrorism
Software Piracy
9
HACKING
Hacking in simple terms means an illegal
intrusion into a computer system and/or network.
It is also known as CRACKING.
Government websites are the
hot targets of the hackers due
to the press/media coverage, it
receives. Hackers enjoy the
media coverage.
10
DENIAL OF SERVICE ATTACK
 Act by the criminal, who floods the bandwidth of
the victims network.
 Is his e-mail box with spam mail depriving him of
the services.
11
DEFINING CYBERCRIME
 Malicious software that attaches itself to other
software. (virus, worms, Trojan Horse, web jacking,
e-mail bombing etc.)
12
COMPUTER VANDALISM
Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism.
Transmitting virus: These are programs that attach
themselves to a file and then circulate .
13
CYBER TERRORISM
Terrorist attacks on the Internet is by distributed denial
of service attacks, hate websites and hate emails, attacks
on sensitive computer networks, etc.
Technology savvy terrorists are using 512-bit encryption,
which is impossible to decrypt…
14
SOFTWARE PIRACY
 Theft of software through the illegal copying of
genuine programs.
 Distribution of products intended to pass for the
original.
15
TYPES OF CYBER ATTACK BY
PERCENTAGE
Financial fraud: 11%
Sabotage of data/networks: 17%
Theft of proprietary information: 20%
System penetration from the outside: 25%
Denial of service: 27%
Unauthorized access by insiders: 71%
Employee abuse of internet privileges 79%
Viruses 85%
16
SAFETY TIPS FOR CYBER CRIME
 Use antivirus software’s.
 Insert firewalls.
 Uninstall unnecessary software
 Maintain backup.
 Check security settings.
 Stay anonymous - choose a genderless screen
name.
 Never give your full name or address to strangers.
 Learn more about Internet privacy.
17
CYBER SECURITY
 Internet security is a branch of computer
security specifically related to the Internet.
 It's objective is to establish rules and measure to
use against attacks over the Internet.
18
ADVANTAGES OF CYBER SECURITY
Defend us from critical attacks.
Browse the safe website.
Internet security process all the incoming and
outgoing data on our computer.
19
Security will defend from hacks and virus.
 The application of cyber security used in our PC
needs update every week.
The security developers will update their database
every week once. Hence the new virus also
deleted…
ADVANTAGES OF CYBER SECURITY
20
CONCLUSION
Technology is destructive only in the hands of
people who do not realize that they are one
and the same process as the universe.
ANY
QUESTION
THANK
YOU
Shreyash patel
From,
If You Want to PPT of this Subject you
can Contact me on my E-mail
pshreyash50@gmail.com
From,
Shreyash patel

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
cyber security
cyber securitycyber security
cyber security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Ähnlich wie Cyber Crime

Ähnlich wie Cyber Crime (20)

Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber security
Cyber security        Cyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Kürzlich hochgeladen

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 

Kürzlich hochgeladen (20)

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Cyber Crime

  • 2. 1 o INTRODUCTION. o DEFINITION. o HISTORY. o CYBER THREAT EVOLUTION. o CATEGORIES OF CYBER CRIME. o TYPES OF CYBER CRIME. o PREVENTION. o SECURITY. o CONCLUSION. CONTENTS
  • 3. 2 INTRODUCTION The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education and technology. There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet.
  • 4. 3 DEFINING CYBERCRIME There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet. Crime committed using a computer and the internet to steal data or information.
  • 5. 4 DEFINING CYBERCRIME  Cybercrime is nothing but where the computer used as an object or subject of crime… Whatever it is Online or Offline  Crime on the web such as distribution of pornography, including theft, and online gambling, Hacking and such as commandeering one computer to launch attacks on other computers, are new.
  • 6. 5 HISTORY  The first recorded cyber crime took place in the year 1820 That is not surprising considering the fact that the ABACUS, which is thought to be the earliest form of a computer, has been around many years ago In India, Japan and China…but not officially declare…
  • 8. 7 CATEGORIZE OF CYBERCRIME The Computer as a Target : using a computer to attack other computers. The computer as a weapon : using a computer to commit real world crimes.
  • 9. 8 TYPES OF CYBER CRIME Hacking Denial of service attack Virus Dissemination Computer Vandalism Cyber Terrorism Software Piracy
  • 10. 9 HACKING Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press/media coverage, it receives. Hackers enjoy the media coverage.
  • 11. 10 DENIAL OF SERVICE ATTACK  Act by the criminal, who floods the bandwidth of the victims network.  Is his e-mail box with spam mail depriving him of the services.
  • 12. 11 DEFINING CYBERCRIME  Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)
  • 13. 12 COMPUTER VANDALISM Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate .
  • 14. 13 CYBER TERRORISM Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt…
  • 15. 14 SOFTWARE PIRACY  Theft of software through the illegal copying of genuine programs.  Distribution of products intended to pass for the original.
  • 16. 15 TYPES OF CYBER ATTACK BY PERCENTAGE Financial fraud: 11% Sabotage of data/networks: 17% Theft of proprietary information: 20% System penetration from the outside: 25% Denial of service: 27% Unauthorized access by insiders: 71% Employee abuse of internet privileges 79% Viruses 85%
  • 17. 16 SAFETY TIPS FOR CYBER CRIME  Use antivirus software’s.  Insert firewalls.  Uninstall unnecessary software  Maintain backup.  Check security settings.  Stay anonymous - choose a genderless screen name.  Never give your full name or address to strangers.  Learn more about Internet privacy.
  • 18. 17 CYBER SECURITY  Internet security is a branch of computer security specifically related to the Internet.  It's objective is to establish rules and measure to use against attacks over the Internet.
  • 19. 18 ADVANTAGES OF CYBER SECURITY Defend us from critical attacks. Browse the safe website. Internet security process all the incoming and outgoing data on our computer.
  • 20. 19 Security will defend from hacks and virus.  The application of cyber security used in our PC needs update every week. The security developers will update their database every week once. Hence the new virus also deleted… ADVANTAGES OF CYBER SECURITY
  • 21. 20 CONCLUSION Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.
  • 24. If You Want to PPT of this Subject you can Contact me on my E-mail pshreyash50@gmail.com From, Shreyash patel